Field of the Invention
-
The present invention relates to a management system to detect a presence of a Wifi range extender in a telecommunication environment and a related method.
Background
-
Wi-Fi or Wifi is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands.
-
The IEEE 802.11 standard is a set of media access control (MAC) and physical layer (PHY) specifications for implementing such wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802).
-
A Wifi range extender takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network. When two or more hosts have to be connected with one another over the IEEE 802.11 protocol and the distance is too long for a direct connection to be established, a wireless repeater is used to bridge the gap. Such a IEEE 802.11 WiFi range-extender is thus used to overcome the coverage problems inside the footprint of access points. However, an unplanned IEEE 802.11 WiFi range-extender deployment can dramatically deteriorate neighbor users performance if it is not managed carefully by the management system. Thus, the management system should detect the presence of such an unmanaged Wifi extender firstly. The problem is that there is no remarkable thing that can distinguish a WiFi extender from all other connected devices of a serving access point. The WiFi extender appears to the serving access point as the same as all other connected devices. Since management of a WiFi range extender by the management system is important in order to proper manage WiFi coverage, either residential or public, it should be detected first.
-
So, the problem to be addressed is the detection of a non-managed WiFi range-extender which is installed behind a serving access point in order to help the management system to manage the network correctly. Via the TR-069 family standards the serving access point can obtain MAC addresses of the connected devices that are connected to the serving access point. Unfortunately, the access point is not able to make a distinction between the MAC address of a WiFi extender and the Mac addresses of other connected devices such as e.g. mobile phones, PCs, laptops ...etc. Similarly, a user equipment is enabled to detect the MAC addresses of its neighboring access points, including the WiFi range-extender, in its receiving range. However, the user equipment is not enabled to make a differentiation between the MAC addresses of the serving access points and one or more WiFi extender(s). Thus, it is not possible to make any decision either from the access point or either from the user equipment measurements in order to detect the presence of the WiFi extender.
Summary
-
An object of the present invention is to provide a solution to this problem i.e. to provide a management system to detect a presence of a Wifi range extender in a telecommunication environment and a method for use by this management system.
-
According to the invention this object is achieved due to leveraging the knowledge from both i.e. the serving access point and the user equipment, at the management system.
-
A management system for detecting a presence of a Wifi range extender in a telecommunication environment that comprises a femto access network and a radio access network comprises :
- a first collector for collecting monitoring data that comprises a first list of MAC addresses of connected devices, the connected devices being connected to the serving access point in the telecommunication environment; and
- a second collector for collecting monitoring data that comprises a second list of MAC addresses of access points, the access points being located within a wifi access range of a user equipment in the telecommunication environment that is connected to the same serving access point; and
- a correlator to correlate the first list with the second list and to identify thereby a common MAC address. In the event when indeed a common MAC address is identified, it is the MAC address of a present Wifi range extender and it confirms hereby the presence of the Wifi range extender in the telecommunication environment.
-
In this way the visibility of the extender at both ends i.e. the serving access point and the user equipment, is exploited. By correlating their respective information, the range-extender is either detected or it is not detected if it is not present in the network. The following basic steps are identified in the method:
- 1) Comparing the MAC addresses list obtained via the serving access point with the list of MAC addresses being obtained by one of the user equipments that are connected to the respective serving access point; and
- 2) Searching for potential common MAC address(es) between these two lists represents MAC address(es) of WiFi extender(s). In the event when a matching between these two lists is detected there is at least one WiFi extender connected to this target serving access point.
- 3) In the event when no matching is found, there is no WiFi extender in this environment.
-
Another characteristic feature of the present invention is that the correlator ot the management system further comprises :
- a first determiner for determining a degree of correlation, called correlation percentage, between a MAC address of the first list and a MAC address of the second list; and
- a second determiner for deciding upon a matching between the two MAC addresses in the event when the correlation percentage exceeds a predefined threshold and for thereby identifying the common MAC address. According to this method a correlation percentage between each MAC address of the first list with each MAC address of the second list is determined and compared to the predefined threshold. In the event when the correlation percentage exceeds the predefined threshold (T) for one (or more) of the correlated couples of MAC addresses, the presence of one (or more) Wifi range extender(s) can be confirmed.
-
A further characterizing embodiment of the present application is that the first determiner comprises a comparator for comparing the consecutive MAC characters of the MAC address of the first list with the consecutive MAC characters of the MAC address of the second list and for determining thereby the correlation percentage.
-
A final implementation feature is that the collecting steps are executed via anyone of a radio access layer and a wired line access layer.
-
It is to be noticed that the term 'comprising', used in the claims, should not be interpreted as being limitative to the means listed thereafter. Thus, the scope of the expression 'a device comprising means A and B' should not be limited to devices consisting only of components A and B. It means that with respect to the present invention, the only relevant components of the device are A and B.
-
The above and other objects and features of the invention will become more apparent and the invention itself will be best understood by referring to the following description of an embodiment taken in conjunction with the accompanying drawings.
Brief Description of the Figures
-
he working of the management system according to the present invention in accordance with its telecommunication environment that is shown in Figure 1 will be explained by means of a functional description of the different blocks shown therein. Based on this description, the practical implementation of the blocks will be obvious to a person skilled in the art and will therefore not be described in details. In addition, the principle working of the management method will be described in further detail.
-
Some embodiments of apparatus and/or methods in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:
- Figure 1 provides an overview of an exemplary telecommunication environment with a management system by which the invention might be executed.
- Figure 2 provides an exemplary embodiment of the functional blocks in the management system according to the present application.
Description of Embodiments
-
Referring to Figure 1 an overview of an exemplary telecommunication environment in which the invention might be applied is shown:
- As a matter of example and possible embodiment Home Environment HN1 shows 3 different kinds of Access with different kinds of Access Points. Each one is providing access to a respective kind of Customer Premises Equipment. Access Point AP1" is providing access via a WiFi connection to the customer premises equipment - Device 3 - DEV3 such as e.g. a tablet personal computer. This Access Point AP1" is supporting the TR98/ TR181 standard. Access Point AP1' is providing access over a wireline to the customer premise equipment DEV2 e.g. respective a personal computer and a Television. This Access Point AP1' is supporting the TR069 protocol.
-
The 3rd access point is also a Wifi Access Point AP1 supporting the TR98/TR181 standard. The aim of the invention is shown for Access Points such as AP1 in the Home environment HN1.
- Home Environment HN1 comprises a serving Wifi Access point AP1 with its associated MAC address MAC1. The serving Wifi Access point AP1 is enabled to provide Wifi access to Wifi user equipments in its environment. The following Wifi user equipments with its associated MAC addresses are shown within the coverage of AP1 :
- User Equipment 11 : UE11(MAC11);
- User Equipment 12 : UE12(MAC12); and
- User Equipment 13: UE13(MAC13); and
- Wifi range Extender EXT1 : EXT1 (MACE1).
- Home environment HN2 comprises a serving Wifi Access point AP2 with its associated MAC address MAC2. The serving Wifi Access point AP2 is enabled to provide Wifi access to Wifi user equipments in its environment. The following Wifi user equipments with its associated MAC addresses are shown within the coverage of AP2 :
- User Equipment 21 : UE21 (MAC21); and
- User Equipment 22 : UE22(MAC22).
- A public Wifi Access Point AP3 is shown with its associated MAC addresses MAC3. The public Wifi Access point AP3 is enabled to provide Wifi access to Wifi user equipments in its environment. The following Wifi user equipments with its associated MAC addresses are shown within the coverage of AP3 :
- User Equipment 31 : UE31 (MAC31); and
- User Equipment 32 : UE32(MAC32).
- Home Environment HN4 comprises a serving Wifi Access point AP4 with its associated MAC address MAC4. The serving Wifi Access point AP4 is enabled to provide Wifi access to Wifi user equipments in its environment. The following Wifi user equipments with its associated MAC addresses are shown within the coverage of AP4 :
- User Equipment 41 : UE41 (MAC41); and
- User Equipment 42 : UE42(MAC42).
-
It is mentioned above that the AP1 in HN1 is enabled to serve access to UE1 2 and UE1 3. Since the quality of the Wifi access for both user equipments showed to be often bad, actual realization of the Wifi access is often unsuccessful. Hereby, a user in the Home environment HN1 decided to install the Wifi range Extender. Hereby the Wifi Range Extender helps the Access Point AP1 to bridge the Wifi distance and coverage towards UE12 and UE13.
-
However, in addition to the local support to AP1 also unplanned interferences (shown in Figure 1 by means of a dotted line) might be introduced by the presence of the Wifi Extender EXT1. As such the unplanned interference between the Wifi range extender EXT1(MACE1) in home environment HN1 and the user equipment UE41 (MAC41) in home environment HN4 is shown.
-
In order to help the management system to manage the different Home Environments properly, the management system should be aware of the presence of the Wifi Extender.
-
The addressed problem is the detection of this non-managed WiFi range-extender EXT1 which is installed behind the serving access point AP1 in order to help the management system MS to manage the network correctly.
-
The management system MS comprises a first collector COLL1, a second collector COLL2 and a correlator CORR. Both collectors COLL1 and COLL2 are both coupled to the different access points in the different telecommunication environments. The correlator CORR is coupled to the first collector COLL1 and to the second collector COLL2.
-
Presume that the serving access point is the access point AP1(MAC1). The goal is to detect the presence of the WiFi range-extender EXT1(MACE1) in the telecommunication environment HN1. The following steps are executed by the Management System MS :
- Step 1 : collecting by the first collector COLL1 monitoring data comprising a first list L1 of MAC addresses of connected devices whereby the connected devices being connected to the serving access point AP1 in the telecommunication environment HN1 i.e. the Management system MS gets the MACs of the associated devices to access point AP1. A possible implementation that can be used to execute this collecting step is "Host table parameters" or "Associated Device table parameters" that are defined in TR-069/181 specifications. Collecting the list L1 by means of the "Host table" or "AssociatedDevice table" does not include the MAC address of the serving AP1 itself. The list L1 contains the MAC addresses of directly connected devices :
- L1(MAC11,MACE1).
- Note that according to this actual example with bad quality between AP1 and the user equipments UE12 and USE13, the MAC addresses of UE12 and UE13 do not appear in the list L1. However, there might be situations where UE12 and/or UE13 have a better reach and will be connected to AP1 and thereby its MAC addresses will appear in the List L1.
- We can describe this in general notifications : assume that the MAC addresses list L1 obtained via access point AP1 contains "N" MAC addresses corresponding to N connected devices. Any MAC in this list L1 is denoted by MACn where n ∈{1,2,...N} and N is the number of associated devices to this access point AP1.
- Step 2 : collecting by the second collector COLL2 monitoring data comprising a second list L2 of MAC addresses of access points, the access points being located within a Wifi access range of a user equipment UE13 that is connected to the serving access point AP1 in the telecommunication environment HN1 i.e. the management system MS gets the MACs from user equipment UE13. It has to be remarked that the used user equipment UE13 should be one of the user equipments that are covered by the serving access point AP1. However, the used user equipment can be connected to the serving access point AP1 directly or via the target extender EXT1.
-
A possible implementation that can be used to execute this collecting step is by means of an instruction that includes the identifier called "Basic Service Set Identifier" BSSIDs which is used to identify Access Points and their clients and which is included in all wireless packets. A device parameter that can be used for this purpose is "Configuration.getAvailableWiFiNAPsResponse."
-
We can describe this in general notifications : assume that the MAC addresses list obtained from the user equipment UE3 contains "M" MAC addresses, each one corresponding to one of M detected access points in the neighborhood. Thus, we can denote any MAC in the second list L2 by MACm where m ∈{1,2,...M}.
-
Under the assumption that UE13 can reach within its Wifi range AP2, AP3, AP4 and EXT1, the MAC addresses list obtained by UE1 3 is :
- L2(MAC2, MAC3, MAC4, MACE1)
-
Step 3 : correlating by the correlator CORR the first list L1 with the second list L2 and identifying thereby a common MAC address MAC-C. The common MAC address is related to the Wifi range extender and confirms hereby its presence in the telecommunication environment HN1 i.e. the management system MS searches for any common/correlated MAC(s) mentioned in both lists. In the present example the common MAC will be MACE1 which is the MAC address of the range extender EXT1 as shown in Figure 1.
-
We can describe this by the following representation :
With :
- C% the correlation (similarity) percentage between MACm in the L2 MAC list and MACn in the L1 MAC list; and
- m and n given from m ∈{1,2,...M} and n ∈{1,2,...N}, respectively, as mentioned above.
-
It appeared from the practical experiments that some of the obtained MACs are differing from the right ones by only one character.
-
As an example, in the event when the connected WiFi extender with MAC address as MACE1 = (64:D1:A3:30:22:F8), it is possible that the serving access point AP1 detects it as (66:D1:A3:30:22:F8) i.e. with one character wrong, while the user equipment always detects the correct MAC address of the WiFi extender EXT1. It should be noted that this measuring fault in the first collecting step sometimes happens but not always. In order to anticipate this, an implementation with a correlation percentage C%, is described here below.
-
It has to be remarked that the collecting steps can be executed via any one of a radio access layer or via a wire line access layer. The connection via the internet protocol network to the management system over respectively the Radio layer is shown in Figure 1 with the broad arrow showing 3G/4G LTE Radio Access Layer via the eNodeB1. It has to be remarked here that this eNodB1 can be integrated in the Access Point AP1 as well. The connection via the internet protocol network to the management system over respectively the wire line access layer is shown with the broad arrow showing Open Mobile Alliance Device Management OMA/DM.
-
Referring to Figure 2 the correlator CORR of the management system MS comprises a first determiner DET1, which on its turn comprises a comparator COMP that is coupled to both collectors COLL1 and COLL2; and a second determiner DET2 being coupled to the first determiner DET1 via the comparator COMP.
-
The 3rd step of correlating is implemented in this way by :
- determining by the first determiner DET1 a degree of correlation, called correlation percentage C%, between a MAC address of the first list L1 and a MAC address of the second list L2. The first determiner DET1 comprises therefore the comparator COMP in order to compare the consecutive MAC characters of the MAC address of the first list L1 with the consecutive MAC characters of the MAC address of the second list L2.
- deciding by the second determiner DET2 upon "matching between the two MAC addresses" in the event when the correlation percentage C% exceeds a predefined threshold T and to thereby identify the common MAC address MAC-C.
-
We can describe this by the following representation :
-
The management system will accept one character wrong in order to decide that there is a WiFi extender existing in the present home environment HN1.
-
In the above example of MAC implementation with characters, the length of the MAC address contains 12 characters. This means that a threshold T, called confidence percentage, can be defined for the situation with one wrong character as 91.6 %.
-
In the event when the determined correlation percentage C% is greater than or equal to the Threshold T (confidence percentage) :
the algorithm considers the actual two MACs as "matching" and declares that the WiFi extender EXT1 is detected.
-
Based upon lab results the range of the correlation percentage i.e. the measure with which two MAC addresses out of L1 and L2 indeed correlates varies between : 0≤ C% ≤100 i.e. it varies from no similarity up to identically similar.
-
This range can be divided into two stages:
-
A final remark is that embodiments of the present invention are described above in terms of functional blocks. From the functional description of these blocks, given above, it will be apparent for a person skilled in the art of designing electronic devices how embodiments of these blocks can be manufactured with well-known electronic components. A detailed architecture of the contents of the functional blocks hence is not given.
-
While the principles of the invention have been described above in connection with specific apparatus, it is to be clearly understood that this description is made only by way of example and not as a limitation on the scope of the invention, as defined in the appended claims.